Industry Trends

October 2026: The Mass Expiration Event Nobody's Talking About

200-day certificates issued in March 2026 expire in October. A wave of simultaneous expirations is coming — and unprepared organizations will see outages. Here's how to get ahead of it.

S
Sarah Chen
VP of Product
2026-04-03
14 min read

The Expiration Wave Is Building

Here's a date you should circle on your calendar: October 1, 2026.

That's when the first batch of 200-day certificates — issued on March 15, the day SC-081 took effect — begins expiring. But the real problem isn't a single date. It's a sustained wave of expirations that will hit organizations throughout October, November, and December 2026.

Many organizations renewed their certificates in March and April as the new 200-day maximum took effect. Those certificates will all expire within a narrow window. If your renewal processes aren't automated, you're heading into a storm.

The Math Behind the Wave

Certificates issued March 15, 2026  → Expire October 1, 2026
Certificates issued April 1, 2026   → Expire October 18, 2026
Certificates issued April 15, 2026  → Expire November 1, 2026
Certificates issued May 1, 2026     → Expire November 17, 2026
Certificates issued May 15, 2026    → Expire December 1, 2026

For organizations that bulk-renewed in March or April, this creates a concentration of expirations that manual processes cannot handle.

Why This Is Different from Normal Expirations

Synchronized Timing

Under 398-day certificates, expirations were spread relatively evenly across the year because certificates were issued at different times over a multi-year period. The shift to 200-day maximum created a synchronization event — many organizations renewed or re-issued certificates around the same time (March-April 2026), creating a cluster of expirations.

Double the Volume

Even without synchronization, 200-day certificates mean twice as many renewals per year. The October wave combines this doubled volume with the synchronization effect, creating a period where renewal demand spikes dramatically.

CA Capacity Concerns

Certificate Authorities will face elevated issuance and validation volumes during the October wave. Organizations that wait until the last minute may encounter:

  • Slower certificate issuance times
  • DCV validation delays
  • Support queue backlogs
  • Rate limiting on ACME endpoints

Industry-Wide Impact

This isn't isolated to one organization. The entire industry transitioned simultaneously on March 15. That means:

  • Your vendors' certificates are also expiring
  • Your partners' API certificates are also expiring
  • Your CDN providers' certificates are also expiring
  • Third-party integrations may fail if their certificates aren't renewed

The Outage Scenarios

Scenario 1: The Cascading Failure

Day 1: Primary web application certificate expires
       → 503 errors for all users
       → Mobile app can't connect to API

Day 1 (+ 2 hours): Wildcard certificate discovered expired
       → Internal microservices lose mTLS
       → Service mesh breaks

Day 1 (+ 4 hours): CDN certificate expires
       → Static assets unavailable even after app cert renewed
       → Users see mixed content warnings

Day 2: Partner API mTLS certificate expires
       → Payment processing fails
       → Order fulfillment halted

Scenario 2: The Weekend Surprise

It's Saturday, October 3. A certificate on the load balancer expires at 2 AM. The on-call engineer receives a page but:

  • Doesn't have access to the certificate management system
  • Doesn't know which CA issued the certificate
  • Can't complete DNS validation because DNS is managed by a different team
  • Can't deploy the certificate because deployment requires a change approval

By Monday morning, the service has been down for 52 hours.

Scenario 3: The Unknown Certificate

The monitoring team watches 500 known certificates. But there are 200 more that nobody knows about — provisioned by developers, inherited from acquisitions, or running on forgotten infrastructure. These expire without warning.

Your October Preparation Checklist

30-Day Sprint (Start Now)

Week 1: Complete Discovery

Run a comprehensive certificate scan across all environments:

discovery_targets: external: - all_public_domains_and_subdomains - cdn_endpoints - saas_custom_domains cloud: - aws_acm_all_regions - azure_key_vault_all_vaults - gcp_certificate_manager internal: - kubernetes_tls_secrets - load_balancers - reverse_proxies - application_servers monitoring: - certificate_transparency_logs

Week 2: Build the Expiration Timeline

Create a calendar view of all certificates expiring between October 1 and December 31, 2026:

PriorityCriteriaAction
CriticalRevenue-impacting servicesAutomate renewal immediately
HighCustomer-facing applicationsAutomate or schedule manual renewal
MediumInternal servicesSchedule renewal with buffer
LowDevelopment/stagingConsider automation or accept risk

Week 3: Automate What You Can

For every certificate expiring in October:

  1. Can it use ACME? → Set up automated renewal now
  2. Can the CA API automate it? → Build automation script
  3. Must it be manual? → Schedule the renewal 30 days before expiration
  4. Is it on a critical path? → Ensure backup renewal procedures exist

Week 4: Test and Verify

  • Run test renewals for all automated certificates
  • Verify deployment automation works end-to-end
  • Confirm monitoring alerts fire correctly
  • Document manual renewal procedures for remaining certificates
  • Identify on-call assignments for the October window

The "War Room" Approach

For organizations with large certificate portfolios (1,000+), consider establishing a certificate renewal war room for October:

  • Daily standup tracking renewal progress
  • Dashboard showing upcoming expirations and renewal status
  • Escalation path for failed renewals
  • Communication plan for stakeholders if outages occur
  • Rollback procedures for failed deployments

Staggering Future Expirations

Breaking the Synchronization

After surviving October, prevent future synchronization by staggering certificate issuance:

staggering_policy: strategy: distribute_evenly window: 30_days # Spread renewals across a 30-day window method: random_offset # Instead of renewing all at threshold # Renew each certificate at: threshold + random(0, 30 days) example: cert_a_renewal: "September 1" cert_b_renewal: "September 8" cert_c_renewal: "September 15" cert_d_renewal: "September 22" # Instead of all renewing September 1

Proactive Renewal Windows

Don't wait for certificates to approach expiration. Establish rolling renewal windows:

  • Renew certificates when they reach 60% of their validity (day 120 of 200)
  • This creates a 80-day buffer for troubleshooting failures
  • Spreads renewal load more evenly across time

Third-Party and Supply Chain Risk

Your Certificates Aren't the Only Ones Expiring

The October wave affects your entire ecosystem:

Upstream Dependencies

  • CDN provider certificates
  • Cloud service certificates
  • SaaS platform certificates
  • API gateway certificates

Downstream Dependencies

  • Customer-facing integrations
  • Partner API connections
  • Webhook endpoints
  • OAuth/OIDC provider certificates

Actions to Take

  1. Identify all third-party certificate dependencies
  2. Contact critical vendors about their October renewal plans
  3. Implement certificate validation monitoring for third-party endpoints
  4. Establish communication channels for coordinated incident response

Monitoring for October

Certificate Expiration Dashboard

Set up a dashboard showing:

┌──────────────────────────────────────────────────┐
│           October Certificate Dashboard           │
├──────────────────────────────────────────────────┤
│ Expiring in 7 days:   ████████████ 47            │
│ Expiring in 14 days:  ██████████████████ 89      │
│ Expiring in 30 days:  ███████████████████████ 156│
│ Expiring in 60 days:  █████████████████████████ 312│
├──────────────────────────────────────────────────┤
│ Auto-renewable:  256 (82%)                        │
│ Manual required:  56 (18%)                        │
│ Unknown status:    0 (0%)   ← This should be 0   │
├──────────────────────────────────────────────────┤
│ Renewal failures (24h):  3                        │
│ Pending deployments:     12                       │
└──────────────────────────────────────────────────┘

Alert Configuration

alerts: - name: certificate_expiring_critical condition: days_to_expiry < 7 severity: critical notify: [pagerduty, slack_oncall] - name: certificate_expiring_warning condition: days_to_expiry < 14 severity: warning notify: [slack_security, email_cert_owners] - name: renewal_failure condition: renewal_attempt_failed severity: critical notify: [pagerduty, slack_oncall] - name: deployment_pending condition: renewed_but_not_deployed > 4_hours severity: warning notify: [slack_platform]

The Silver Lining

The October wave, while disruptive for unprepared organizations, is also an opportunity. It forces the investment in automation that should have happened already. Organizations that automate their way through October will be well-positioned for:

  • The 100-day certificate transition in March 2027
  • The eventual 47-day certificate mandate in March 2029
  • Ongoing operational efficiency and reduced outage risk

How TigerTrust Helps You Survive October

TigerTrust's platform is built to handle exactly this kind of certificate volume:

  • Automated discovery identifies every certificate in your environment — including the ones you don't know about
  • Expiration timeline gives you a calendar view of every upcoming expiration
  • Policy-driven renewal automatically renews certificates before they reach critical windows
  • Multi-CA ACME handles renewals across Let's Encrypt, DigiCert, Sectigo, and others
  • Automated deployment pushes renewed certificates to AWS, Azure, GCP, Kubernetes, and on-premises endpoints

Don't wait for October. Start your certificate automation today.

TOPICS

certificate expiration
200-day certificates
certificate outages
October 2026
certificate renewal
TigerTrust

SHARE THIS ARTICLE

Ready to Transform Your Certificate Management?

See how TigerTrust can help you automate certificate lifecycle management at scale.